Skip to content

Commit 70f266f

Browse files
committed
some content fixes and notes
1 parent 4892107 commit 70f266f

File tree

5 files changed

+33
-8
lines changed

5 files changed

+33
-8
lines changed

articles/dns/dns-private-resolver-get-started-portal.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,15 @@ To apply your forwarding ruleset to the second virtual network, you must create
127127

128128
![Screenshot of ruleset virtual network links.](./media/dns-resolver-getstarted-portal/ruleset-links.png)
129129

130+
## Delete a virtual network link
131+
132+
Later in this article a rule is created using the private resolver inbound endpoint as a destination. This can cause a DNS resolution loop if the VNet where the resolver is provisioned is also linked to the ruleset. To fix this issue, remove the link to **myvnet**.
133+
134+
1. Search for **DNS forwarding rulesets** in the Azure services list and select your ruleset (ex: **myruleset**).
135+
2. Select **Virtual Network Links**, choose **myvnet-link**, select **Remove** and select **OK**.
136+
137+
![Screenshot of ruleset virtual network links after removing a link.](./media/dns-resolver-getstarted-portal/ruleset-links-remove.png)
138+
130139
## Configure a DNS forwarding ruleset
131140

132141
Add or remove specific rules your DNS forwarding ruleset as desired, such as:

articles/dns/dns-private-resolver-overview.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.custom: references_regions, ignite-2022
66
author: greg-lindsay
77
ms.service: dns
88
ms.topic: overview
9-
ms.date: 12/16/2022
9+
ms.date: 03/02/2023
1010
ms.author: greglin
1111
#Customer intent: As an administrator, I want to evaluate Azure DNS Private Resolver so I can determine if I want to use it instead of my current DNS resolver service.
1212
---
@@ -73,17 +73,20 @@ Azure DNS Private Resolver is available in the following regions:
7373

7474
Azure DNS Private Resolver doesn't move or store customer data out of the region where the resolver is deployed.
7575

76-
## DNS resolver endpoints
76+
## DNS resolver endpoints and rulesets
7777

78-
For more information about endpoints and rulesets, see [Azure DNS Private Resolver endpoints and rulesets](private-resolver-endpoints-rulesets.md).
78+
A summary of resolver endpoints and rulesets is provided in this article. For detailed information about endpoints and rulesets, see [Azure DNS Private Resolver endpoints and rulesets](private-resolver-endpoints-rulesets.md).
7979

80-
### Inbound endpoints
80+
## Inbound endpoints
8181

8282
An inbound endpoint enables name resolution from on-premises or other private locations via an IP address that is part of your private virtual network address space. To resolve your Azure private DNS zone from on-premises, enter the IP address of the inbound endpoint into your on-premises DNS conditional forwarder. The on-premises DNS conditional forwarder must have a network connection to the virtual network.
8383

8484
The inbound endpoint requires a subnet in the VNet where it’s provisioned. The subnet can only be delegated to **Microsoft.Network/dnsResolvers** and can't be used for other services. DNS queries received by the inbound endpoint will ingress to Azure. You can resolve names in scenarios where you have Private DNS zones, including VMs that are using auto registration, or Private Link enabled services.
8585

86-
### Outbound endpoints
86+
> [!NOTE]
87+
> The IP address assigned to an inbound endpoint is not a static IP address that you can choose. Typically, the 5th available IP address in the subnet is assigned. However, if the inbound endpoint is reprovisioned, this IP address might change. The IP address does not change unless the inbound endpoint is reprovisioned.
88+
89+
## Outbound endpoints
8790

8891
An outbound endpoint enables conditional forwarding name resolution from Azure to on-premises, other cloud providers, or external DNS servers. This endpoint requires a dedicated subnet in the VNet where it’s provisioned, with no other service running in the subnet, and can only be delegated to **Microsoft.Network/dnsResolvers**. DNS queries sent to the outbound endpoint will egress from Azure.
8992

@@ -135,6 +138,8 @@ Outbound endpoints have the following limitations:
135138
### Other restrictions
136139

137140
- IPv6 enabled subnets aren't supported.
141+
- DNS private resolver does not support Azure ExpressRoute FastPath.
142+
138143

139144
## Next steps
140145

104 KB
Loading
-7.08 KB
Loading

articles/dns/private-resolver-endpoints-rulesets.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: greg-lindsay
66
ms.service: dns
77
ms.custom: ignite-2022
88
ms.topic: conceptual
9-
ms.date: 12/16/2022
9+
ms.date: 03/02/2023
1010
ms.author: greglin
1111
#Customer intent: As an administrator, I want to understand components of the Azure DNS Private Resolver.
1212
---
@@ -34,6 +34,9 @@ The IP address associated with an inbound endpoint is always part of the private
3434

3535
![View inbound endpoints](./media/private-resolver-endpoints-rulesets/east-inbound-endpoint.png)
3636

37+
> [!NOTE]
38+
> The IP address assigned to an inbound endpoint is not a static IP address that you can choose. Typically, the 5th available IP address in the subnet is assigned. However, if the inbound endpoint is reprovisioned, this IP address might change. The IP address does not change unless the inbound endpoint is reprovisioned.
39+
3740
## Outbound endpoints
3841

3942
Outbound endpoints egress from Azure and can be linked to [DNS Forwarding Rulesets](#dns-forwarding-rulesets).
@@ -57,14 +60,14 @@ A ruleset can't be linked to a virtual network in another region. For more infor
5760

5861
When you link a ruleset to a virtual network, resources within that virtual network will use the DNS forwarding rules enabled in the ruleset. The linked virtual networks are not required to peer with the virtual network where the outbound endpoint exists, but these networks can be configured as peers. This configuration is common in a hub and spoke design. In this hub and spoke scenario, the spoke vnet doesn't need to be linked to the private DNS zone in order to resolve resource records in the zone. In this case, the forwarding ruleset rule for the private zone sends queries to the hub vnet's inbound endpoint. For example: **azure.contoso.com** to **10.10.0.4**.
5962

60-
The following screenshot shows a DNS forwarding ruleset linked to two virtual networks: a hub vnet: **myeastvnet**, and a spoke vnet: **myeastspoke**.
63+
The following screenshot shows a DNS forwarding ruleset linked to the spoke virtual network: **myeastspoke**.
6164

6265
![View ruleset links](./media/private-resolver-endpoints-rulesets/ruleset-links.png)
6366

6467
Virtual network links for DNS forwarding rulesets enable resources in other vnets to use forwarding rules when resolving DNS names. The vnet with the private resolver must also be linked from any private DNS zones for which there are ruleset rules.
6568

6669
For example, resources in the vnet `myeastspoke` can resolve records in the private DNS zone `azure.contoso.com` if:
67-
- The ruleset provisioned in `myeastvnet` is linked to `myeastspoke` and `myeastvnet`
70+
- The ruleset provisioned in `myeastvnet` is linked to `myeastspoke`
6871
- A ruleset rule is configured and enabled in the linked ruleset to resolve `azure.contoso.com` using the inbound endpoint in `myeastvnet`
6972

7073
### Rules
@@ -90,6 +93,14 @@ For example, if you have the following rules:
9093

9194
A query for `secure.store.azure.contoso.com` will match the **AzurePrivate** rule for `azure.contoso.com` and also the **Contoso** rule for `contoso.com`, but the **AzurePrivate** rule takes precedence because the prefix `azure.contoso` is longer than `contoso`.
9295

96+
> [!IMPORTANT]
97+
> If a rule is present in the ruleset that has as its destination a private resolver inbound endpoint, do not link the ruleset to the VNet where the inbound endpoint is provisioned. This configuration can cause DNS resolution loops. For example: In the previous scenario, no ruleset link should be added to `myeastvnet` because the inbound endpoint at `10.10.0.4` is provisioned in `myeastvnet` and a rule is present that resolves `azure.contoso.com` using the inbound endpoint.
98+
99+
#### Rule processing
100+
101+
- If multiple DNS servers are entered as the destination for a rule, the first IP address that is entered will be used unless it doesn't respond. An exponential backoff algorithm is used to determine whether or not a destination IP address is responsive. Destination addresses that are marked as unresponsive are not used for 30 minutes.
102+
- Certain domains will ignore a wildcard rule for DNS resolution, because they are reserved for Azure services. See [Azure services DNS zone configuration](../private-link/private-endpoint-dns.md#azure-services-dns-zone-configuration) for a list of domains that are reserved. The two-label DNS names listed in this article (ex: windows.net, azure.com, azure.net, windowsazure.us) are reserved for Azure services.
103+
93104
> [!IMPORTANT]
94105
> - You can't enter the Azure DNS IP address of 168.63.129.16 as the destination IP address for a rule. Attempting to add this IP address will output the error: **Exception while making add request for rule**.
95106
> - Do not use the private resolver's inbound endpoint IP address as a forwarding destination for zones that are not linked to the virtual network where the private resolver is provisioned.

0 commit comments

Comments
 (0)